Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
19 Indlæg 13 Posters 1 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

    Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

    https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

    sempf@infosec.exchangeS This user is from outside of this forum
    sempf@infosec.exchangeS This user is from outside of this forum
    sempf@infosec.exchange
    wrote sidst redigeret af
    #3

    @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

    That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

    mttaggart@infosec.exchangeM G skaverat@skaverat.netS 3 Replies Last reply
    0
    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

      OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

      Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

      https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

      phillycodehound@indieweb.socialP This user is from outside of this forum
      phillycodehound@indieweb.socialP This user is from outside of this forum
      phillycodehound@indieweb.social
      wrote sidst redigeret af
      #4

      @mttaggart I'm going nowhere near that "malware" laden AI shit.

      Don't get me wrong, I like AI systems, but OpenClaw is scary as shit!

      1 Reply Last reply
      0
      • sempf@infosec.exchangeS sempf@infosec.exchange

        @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

        That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

        mttaggart@infosec.exchangeM This user is from outside of this forum
        mttaggart@infosec.exchangeM This user is from outside of this forum
        mttaggart@infosec.exchange
        wrote sidst redigeret af
        #5

        @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

        sempf@infosec.exchangeS G fritzadalis@infosec.exchangeF 3 Replies Last reply
        0
        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

          OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

          Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

          https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

          katzenberger@tldr.nettime.orgK This user is from outside of this forum
          katzenberger@tldr.nettime.orgK This user is from outside of this forum
          katzenberger@tldr.nettime.org
          wrote sidst redigeret af
          #6

          @mttaggart

          »Got overconfident because this workflow had been working on my toy inbox for weeks.«

          "toy inbox" and "weeks" sound quite odd here, when used together.

          1 Reply Last reply
          0
          • sempf@infosec.exchangeS sempf@infosec.exchange

            @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

            That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

            G This user is from outside of this forum
            G This user is from outside of this forum
            glitzersachen@hachyderm.io
            wrote sidst redigeret af
            #7

            @Sempf @mttaggart

            Resistance. In the end, since their lordships cannot be bothered to understand that their knew shiny is actually hell spawn, the only thing that can be done is resistance.

            Until the bubble bursts (my expectation is, we'll have to hold it up for at most 6-10 months, then the shady financing around OpenAI will unravel and suck every business model based on AI into the abyss).

            1 Reply Last reply
            0
            • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

              @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

              sempf@infosec.exchangeS This user is from outside of this forum
              sempf@infosec.exchangeS This user is from outside of this forum
              sempf@infosec.exchange
              wrote sidst redigeret af
              #8

              @mttaggart Wow. Ok I'll take a look, thank you. Many concerned folx.

              1 Reply Last reply
              0
              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

                G This user is from outside of this forum
                G This user is from outside of this forum
                glitzersachen@hachyderm.io
                wrote sidst redigeret af
                #9

                @mttaggart @Sempf

                Oh, I see, @Sempf was about detecting it.

                From what I see, the answer is, if you implement ISO 27001 you'd have to introduce managed machines anyway, meaning you can prevent admin access by users and always pull a software inventory from the machines under your rule.

                There is various software to support this.

                1 Reply Last reply
                0
                • sempf@infosec.exchangeS sempf@infosec.exchange

                  @mttaggart Seeing as how OpenClaw is doing nothing except expressly, in its mind anyway, performing the requests of a user under that user's permissions using that user's tools, how exactly would you recommend we prevent it on enterprise networks?

                  That reads kind of snarky, and it isn't. It's an honest question. I just got it from a customer.

                  skaverat@skaverat.netS This user is from outside of this forum
                  skaverat@skaverat.netS This user is from outside of this forum
                  skaverat@skaverat.net
                  wrote sidst redigeret af
                  #10

                  @Sempf @mttaggart

                  > how exactly would you recommend we prevent it on enterprise networks?

                  As LLMs are by nature not deterministic, the only way is to not use it

                  1 Reply Last reply
                  0
                  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                    @Sempf Without chasing down binary hashes, this is the best I've found for detection/remediation: https://github.com/knostic/openclaw-detect

                    fritzadalis@infosec.exchangeF This user is from outside of this forum
                    fritzadalis@infosec.exchangeF This user is from outside of this forum
                    fritzadalis@infosec.exchange
                    wrote sidst redigeret af
                    #11

                    @mttaggart @Sempf
                    Hm, a lot of this could be detected with Sentinel...

                    mttaggart@infosec.exchangeM 1 Reply Last reply
                    0
                    • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                      @mttaggart @Sempf
                      Hm, a lot of this could be detected with Sentinel...

                      mttaggart@infosec.exchangeM This user is from outside of this forum
                      mttaggart@infosec.exchangeM This user is from outside of this forum
                      mttaggart@infosec.exchange
                      wrote sidst redigeret af
                      #12

                      @FritzAdalis @Sempf Tanium too, methinks. The easiest tell is the openclaw folder, which is created regardless of install method.

                      The network detections are rough. 18789/tcp has a lot of false positives, and also the modern installation is not open by default. It also can use Tailscale for exposure, so you'll see Wireguard traffic, but not OpenClaw.

                      fritzadalis@infosec.exchangeF 1 Reply Last reply
                      0
                      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                        @FritzAdalis @Sempf Tanium too, methinks. The easiest tell is the openclaw folder, which is created regardless of install method.

                        The network detections are rough. 18789/tcp has a lot of false positives, and also the modern installation is not open by default. It also can use Tailscale for exposure, so you'll see Wireguard traffic, but not OpenClaw.

                        fritzadalis@infosec.exchangeF This user is from outside of this forum
                        fritzadalis@infosec.exchangeF This user is from outside of this forum
                        fritzadalis@infosec.exchange
                        wrote sidst redigeret af
                        #13

                        @mttaggart @Sempf
                        Well the clients are instrumented with Defender, so if e.g. 18789/tcp is open I can see which procees. Or I could run the script with Intune, but I already have the data.

                        mttaggart@infosec.exchangeM 1 Reply Last reply
                        0
                        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                          OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                          Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                          https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                          tehfishman@ioc.exchangeT This user is from outside of this forum
                          tehfishman@ioc.exchangeT This user is from outside of this forum
                          tehfishman@ioc.exchange
                          wrote sidst redigeret af
                          #14

                          @mttaggart to highlight how absurd this is, a collection of synonymous scenarios:

                          Head Linux administrator accidentally runs `rm -rf /`
                          Lead DBA accidentally drops production database
                          Secretary of HHS takes up scientifically dubious fad diet (whoops)
                          Safe driving instructor gets license revoked after multiple DUI

                          1 Reply Last reply
                          0
                          • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                            @mttaggart @Sempf
                            Well the clients are instrumented with Defender, so if e.g. 18789/tcp is open I can see which procees. Or I could run the script with Intune, but I already have the data.

                            mttaggart@infosec.exchangeM This user is from outside of this forum
                            mttaggart@infosec.exchangeM This user is from outside of this forum
                            mttaggart@infosec.exchange
                            wrote sidst redigeret af
                            #15

                            @FritzAdalis @Sempf That's just the default though, and shouldn't be the only check. Luckily, since openclaw is the binary, you can also just look for process creation.

                            badsamurai@infosec.exchangeB 1 Reply Last reply
                            0
                            • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                              @FritzAdalis @Sempf That's just the default though, and shouldn't be the only check. Luckily, since openclaw is the binary, you can also just look for process creation.

                              badsamurai@infosec.exchangeB This user is from outside of this forum
                              badsamurai@infosec.exchangeB This user is from outside of this forum
                              badsamurai@infosec.exchange
                              wrote sidst redigeret af
                              #16

                              @mttaggart @FritzAdalis @Sempf if you’re a Tenable shop, they have a plugin as well. Not as active as a network or endpoint detection, but it’s a common thing many of us already have and sending to our SIEMs. Auto-contain that shit.

                              https://www.tenable.com/plugins/nessus/297108

                              1 Reply Last reply
                              0
                              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                                OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                                Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                                https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                                thomasjwebb@mastodon.socialT This user is from outside of this forum
                                thomasjwebb@mastodon.socialT This user is from outside of this forum
                                thomasjwebb@mastodon.social
                                wrote sidst redigeret af
                                #17

                                @mttaggart the whole point of automation should be to work around the fact that humans make mistakes, not to place landmines on all the places people make mistakes. I think this tech is being embraced by the same kind of people who didn't immediately have alarms going off in their head about cloud IoT products.

                                1 Reply Last reply
                                0
                                • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                                  OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                                  Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                                  https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                                  rpardee@hachyderm.ioR This user is from outside of this forum
                                  rpardee@hachyderm.ioR This user is from outside of this forum
                                  rpardee@hachyderm.io
                                  wrote sidst redigeret af
                                  #18

                                  @mttaggart Over here giggling like a maniac reading this shit...

                                  1 Reply Last reply
                                  0
                                  • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

                                    OpenClaw is indistinguishable from malware and should be treated as such in enterprise networks.

                                    Do what you want with your own data and gear, but bring that garbage onto my network and I am locking all phaser banks.

                                    https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/

                                    greatbigtable@mastodon.socialG This user is from outside of this forum
                                    greatbigtable@mastodon.socialG This user is from outside of this forum
                                    greatbigtable@mastodon.social
                                    wrote sidst redigeret af
                                    #19

                                    @mttaggart When will they learn that "instructing" an AI agent is not the same as programming an automation routine.

                                    One is deterministic and one is most decidedly NOT!

                                    You can get bad results with programming; GIGO after all. However, you can never be 100% sure what you're going to get from probabilistic AI.

                                    It's a version of the problem expressed in Zack Korman's video about scanning AI bot skills for security. Even if you get it mostly right, the gap's the problem.

                                    https://www.youtube.com/watch?v=GOzUIlgAcjY

                                    1 Reply Last reply
                                    0
                                    • tanyakaroli@expressional.socialT tanyakaroli@expressional.social shared this topic
                                    Svar
                                    • Svar som emne
                                    Login for at svare
                                    • Ældste til nyeste
                                    • Nyeste til ældste
                                    • Most Votes


                                    • Log ind

                                    • Har du ikke en konto? Tilmeld

                                    • Login or register to search.
                                    Powered by NodeBB Contributors
                                    Graciously hosted by data.coop
                                    • First post
                                      Last post
                                    0
                                    • Hjem
                                    • Seneste
                                    • Etiketter
                                    • Populære
                                    • Verden
                                    • Bruger
                                    • Grupper